Explain the concepts and procedures associated with defensive technologies and discuss why the concepts and procedures are important to an organization.
Evaluate the use of honeypots in securing network infrastructures.
Describe At Least Two Types of Honeypots
Describe at least two types of honeypots and when each is likely to be used.
Analyze Legal Ramifications of Using Honeypots Within an Organization’s Network
Analyze the legal ramifications of using honeypots within an organization’s network and discuss ways to determine if the benefits outweigh the risks.